CVE-2018-5392

NameCVE-2018-5392
Descriptionmingw-w64 version 5.0.4 by default produces executables that opt in to ASLR, but are not compatible with ASLR. ASLR is an exploit mitigation technique used by modern Windows platforms. For ASLR to function, Windows executables must contain a relocations table. Despite containing the "Dynamic base" PE header, which indicates ASLR compatibility, Windows executables produced by mingw-w64 have the relocations table stripped from them by default. This means that executables produced by mingw-w64 are vulnerable to return-oriented programming (ROP) attacks. Windows executables generated by mingw-w64 claim to be ASLR compatible, but are not. Vulnerabilities in such executables are more easily exploitable as a result.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs968277

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mingw-w64 (PTS)jessie3.2.0-2vulnerable
stretch5.0.1-1vulnerable
buster6.0.0-3vulnerable
bullseye8.0.0-1vulnerable
bookworm10.0.0-3vulnerable
trixie, sid11.0.1-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mingw-w64source(unstable)(unfixed)unimportant968277

Notes

https://sourceforge.net/p/mingw-w64/mailman/message/31034877/
https://sourceware.org/bugzilla/show_bug.cgi?id=17321
https://sourceware.org/bugzilla/show_bug.cgi?id=19011
https://www.kb.cert.org/vuls/id/307144 (describes workaround)

Search for package or bug name: Reporting problems